About Us

About Us

QUESTION 36
Which two statements about MACSec are true?(two)
A. It can be enabled on individual ports at Layer 3 to allow MACsec devices to access the network.
B. It encrypts packets at Layer 3, which allows devices to handle packets in accordance with network policies.
C. It maintains network intelligence as it is applied to router uplinks and downlinks.
D. It users symmetric-key encyption to protect data confidentiality.
E. It can use IEEE 802.1x master keys to encrypt wired and wireless links.
F. It works in conjunction with IEEE 802.1x – 2010 prot-based access control.
Correct Answer: DF
QUESTION 37
Refer to the exhibit. You issued the show crypto isakmp sa command to troubleshoot a connection failure on an IPsec VPN, what possible issue does the given output indicate?
ASA# show crypto isakmp saype: LZL
Active SA: 1
Rekey SA: 0 (a tunnel will report 1 Active and 1 rekey SA during rekey)
IKE peer: 192.168.10.10
Rekey: BB
Role: initiator
A. The pre-shared keys are mismatched.
B. The peer is failing to respond.
C. The transform sets are mismatched.
D. The crypto ACLs are mismatched.
Correct Answer: A